General

  • Target

    View.bin

  • Size

    170KB

  • Sample

    220330-pbskksbhh6

  • MD5

    f1a98f35102de03ade78f77b4d32672c

  • SHA1

    7c10c2784119e89e71ef22900ded48cfaaef7401

  • SHA256

    7526ce309a80adea50423093cb6bba5c13ee1a3b9e6b4317e6c7f02569aa48cd

  • SHA512

    9a51ddc114286946d823ac36af7b4f56307123d152854e1410d263bae3f7c7b520286b193901710f6be5bc9380e2d1ad79dea2060a8211d5dc006392fb6bc667

Malware Config

Targets

    • Target

      View.bin

    • Size

      170KB

    • MD5

      f1a98f35102de03ade78f77b4d32672c

    • SHA1

      7c10c2784119e89e71ef22900ded48cfaaef7401

    • SHA256

      7526ce309a80adea50423093cb6bba5c13ee1a3b9e6b4317e6c7f02569aa48cd

    • SHA512

      9a51ddc114286946d823ac36af7b4f56307123d152854e1410d263bae3f7c7b520286b193901710f6be5bc9380e2d1ad79dea2060a8211d5dc006392fb6bc667

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty Payload

    • Async RAT payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks